{"id":"https://openalex.org/W4362654049","doi":"https://doi.org/10.1109/lnet.2023.3264827","title":"Amplification/Reflection Attack Suppression Using Victim Separation","display_name":"Amplification/Reflection Attack Suppression Using Victim Separation","publication_year":2023,"publication_date":"2023-04-05","ids":{"openalex":"https://openalex.org/W4362654049","doi":"https://doi.org/10.1109/lnet.2023.3264827"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2023.3264827","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068023905","display_name":"Hawa Singh Gurjar","orcid":null},"institutions":[{"id":"https://openalex.org/I76777374","display_name":"Central University of Rajasthan","ror":"https://ror.org/056y7zx62","country_code":"IN","type":"education","lineage":["https://openalex.org/I76777374"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hawa Singh Gurjar","raw_affiliation_strings":["Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India","institution_ids":["https://openalex.org/I76777374"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051840324","display_name":"Gaurav Somani","orcid":"https://orcid.org/0000-0001-7147-165X"},"institutions":[{"id":"https://openalex.org/I76777374","display_name":"Central University of Rajasthan","ror":"https://ror.org/056y7zx62","country_code":"IN","type":"education","lineage":["https://openalex.org/I76777374"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Somani","raw_affiliation_strings":["Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India","institution_ids":["https://openalex.org/I76777374"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.438,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.633114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":68,"max":79},"biblio":{"volume":"5","issue":"2","first_page":"140","last_page":"143"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/separation","display_name":"Separation (statistics)","score":0.7779025},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection","score":0.6391624}],"concepts":[{"id":"https://openalex.org/C2776061190","wikidata":"https://www.wikidata.org/wiki/Q7451805","display_name":"Separation (statistics)","level":2,"score":0.7779025},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.6391624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40512508},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.32244056},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2023.3264827","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.67,"display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320334771","funder_display_name":"Science and Engineering Research Board","award_id":"CRG/2020/005759"}],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1891329316","https://openalex.org/W1989454965","https://openalex.org/W2022350629","https://openalex.org/W2154350082","https://openalex.org/W2765228046","https://openalex.org/W2973528622","https://openalex.org/W3153623691","https://openalex.org/W3174247628"],"related_works":["https://openalex.org/W4396701345","https://openalex.org/W4391913857","https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2071676784","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Amplification":[0],"and":[1,18,39,61],"reflection":[2,38],"attacks":[3,8,42,74],"represent":[4],"flavors":[5],"of":[6,37,82],"DDoS":[7,41],"which":[9],"use":[10],"servers":[11],"such":[12],"as":[13,20],"DNS,":[14],"NTP,":[15],"SNMP,":[16],"SSDP":[17],"CoAP":[19],"amplifier":[21],"to":[22,33,84],"launch":[23],"the":[24,35,45,49,87,93],"attacks.":[25],"In":[26],"this":[27],"letter,":[28],"we":[29],"describe":[30],"a":[31,76],"method":[32],"minimize":[34],"effects":[36],"amplification":[40,73],"by":[43],"separating":[44],"victim":[46],"service":[47],"under":[48],"attack.":[50],"We":[51],"propose":[52],"three":[53],"approaches":[54],"involving":[55],"container":[56],"level":[57,64],"separation,":[58],"packet":[59],"limiting,":[60],"network":[62],"hardware":[63],"separation.":[65],"Our":[66],"detailed":[67],"experimental":[68],"results":[69],"on":[70],"DNS":[71],"based":[72],"show":[75],"'near-no-attack'":[77],"performance":[78],"with":[79],"an":[80],"improvement":[81],"up":[83],"88%":[85],"in":[86],"test":[88],"completion":[89],"time":[90],"while":[91],"using":[92],"proposed":[94],"approaches.":[95]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4362654049","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-13T02:44:03.228742","created_date":"2023-04-07"}